Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5739-1 | wpa security update |
EUVD |
EUVD-2024-46526 | An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist. |
Ubuntu USN |
USN-6945-1 | wpa_supplicant and hostapd vulnerability |
Wed, 18 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 17 Sep 2024 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical
Canonical ubuntu Linux |
|
| CPEs | cpe:2.3:a:w1.fi:wpa_supplicant:-:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Canonical
Canonical ubuntu Linux |
Wed, 11 Sep 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 29 Aug 2024 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
threat_severity
|
threat_severity
|
Wed, 07 Aug 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | wpa_supplicant: wpa_supplicant loading arbitrary shared objects allowing privilege escalation | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 07 Aug 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
W1.fi
W1.fi wpa Supplicant |
|
| CPEs | cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:* | |
| Vendors & Products |
W1.fi
W1.fi wpa Supplicant |
|
| Metrics |
ssvc
|
Wed, 07 Aug 2024 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist. | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-09-18T15:39:53.818Z
Reserved: 2024-05-23T21:10:21.160Z
Link: CVE-2024-5290
Updated: 2024-08-07T14:04:34.876Z
Status : Analyzed
Published: 2024-08-07T09:16:05.553
Modified: 2024-09-17T13:09:13.683
Link: CVE-2024-5290
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN